<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote Access VPN - issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1099690#M895585</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes i have the access list NONAT configured&lt;/P&gt;&lt;P&gt;yes there is a site to site working ok&lt;/P&gt;&lt;P&gt;yes i have used the sysopt connection permit-ipsec command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 02 Oct 2008 09:41:21 GMT</pubDate>
    <dc:creator>SOL10</dc:creator>
    <dc:date>2008-10-02T09:41:21Z</dc:date>
    <item>
      <title>Remote Access VPN - issue</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1099688#M895573</link>
      <description>&lt;P&gt;HI all&lt;/P&gt;&lt;P&gt;im trying to set up a Remote Access VPN on pix 6.3 (where once connected you are assigned only 1 IP and that IP can only RDP to one server 192.168.1.17) and although i connect to the the vpn ok, i cant RDP to that server. on the vpn client, the sent bytes are going up but the recvd bytes are 0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the remote server I have added a static route as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route add 192.168.10.0 mask 255.255.255.0 192.168.1.245(inside interface of pix) its on same segment&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;below are the VPN configs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list split-tunnel permit ip 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool RA_VPN_SUPPORT 192.168.10.11 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NONAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set RA_VPN_SET esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto dynamic-map DYN_MAP 4 set transform-set RA_VPN_SET&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map CRYPTO_VPN 99 ipsec-isakmp dynamic DYN_MAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map CRYPTO_VPN client configuration address initiate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map CRYPTO_VPN client authentication RA_VPN_AAA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map CRYPTO_VPN interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp key ******** address 0.0.0.0 netmask 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption des&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp policy 20 group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup RA_VPN_SUPPORT address-pool RA_VPN_SUPPORT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup RA_VPN_SUPPORT dns-server 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup RA_VPN_SUPPORT default-domain test.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup RA_VPN_SUPPORT split-tunnel NONAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup RA_VPN_SUPPORT idle-time 1800&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup RA_VPN_SUPPORT password ********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:52:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1099688#M895573</guid>
      <dc:creator>SOL10</dc:creator>
      <dc:date>2019-03-11T13:52:07Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN - issue</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1099689#M895579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have the access list "NONAT" specified in your config?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have other working tunnels on the device?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you used the command "sysopt connection permit-ipsec" or allowed access to the LAN address on the outside access list of the PIX?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Oct 2008 09:29:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1099689#M895579</guid>
      <dc:creator>_Luke_</dc:creator>
      <dc:date>2008-10-02T09:29:10Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN - issue</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1099690#M895585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes i have the access list NONAT configured&lt;/P&gt;&lt;P&gt;yes there is a site to site working ok&lt;/P&gt;&lt;P&gt;yes i have used the sysopt connection permit-ipsec command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Oct 2008 09:41:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1099690#M895585</guid>
      <dc:creator>SOL10</dc:creator>
      <dc:date>2008-10-02T09:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN - issue</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1099691#M895587</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does the server have an appropriate return route?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you ping the inside of the PIX from the VPN client if you specify "management-interface inside" ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Oct 2008 10:34:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1099691#M895587</guid>
      <dc:creator>_Luke_</dc:creator>
      <dc:date>2008-10-02T10:34:06Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN - issue</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1099692#M895589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes the server has a static route to 192.168.10.0 via inside interface of pix as on same segment&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no i cant.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Oct 2008 10:36:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1099692#M895589</guid>
      <dc:creator>SOL10</dc:creator>
      <dc:date>2008-10-02T10:36:08Z</dc:date>
    </item>
  </channel>
</rss>

